Professional Documents
Culture Documents
Fundamentals
2.1 Introduction
Information Technology is a key enabler in modern enterprises and the relevance of IT on
auditing in terms of risks; security, control and changes required in audit process and
procedures; cannot be ignored. Any enterprise needs effective and efficient ways to use
Business Process Automation (BPA), which is largely aided by Information Technology.
Information Systems, which forms the backbone of any enterprise comprises of various layers
such as: Application Software; Database Management Systems (DBMS); System Software;
Hardware; Network Links and People-Users. Further, whenever an information system has to
be deployed for the first time or some major changes are required, we need to implement
Information System Life Cycle. This has different phases which encompass System
Development, System Investigation, System Analysis, System Design, System
Implementation, System Maintenance and Review.
2.2 Need for Information Technology
Understanding ‘How IT is deployed in enterprises’ is imperative to learning about business.
IT in the present context may be referred as a computer-based tool that people use to work
with information and support the information-processing needs of an enterprise. IT allows
enterprises to work more efficiently and to maximize productivity. Faster communication,
electronic storage and the protection of records are advantages that IT can give to any
enterprise. IT enables business enterprises to differentiate their products and services from
their competitors.
2.2.1 Communication Capabilities
IT provides resources to enterprises to communicate quickly and effectively. With these
communication capabilities, enterprises can now integrate their business functions and
segments spread across different geographical areas. Any global enterprise having an
international presence can integrate its far flung business locations using communication
capabilities offered by IT.
Some of the common and efficient communication tools are Emails, Voice over Internet
Protocol (VoIP), WhatsApp Messenger etc. Skype is one such popular VoIP service, which
allows people across the world to make free, unlimited, superior quality voice calls via its
innovative peer-to-peer software.
INVESTIGATE
Understand the
Problem
MAINTENANCE & ANALYSE
REVIEW Assess the
Evaluate Results Solutions
IMPLEMENT DESIGN
Put Solution Design or select the
into affect best solution
A typical wireless access point might have a range of 32 meters (120 ft.). Wi-Fi can be less
secure than wired connections because an intruder does not need a physical connection.
Wi-Fi networks use radio technologies called 802.11 to provide secure, reliable, fast
wireless connectivity. A Wi-Fi network can be used to connect electronic devices to each
other, to the Internet, and to wired networks (which use Ethernet technology). Wi-Fi
networks work well for small businesses providing connectivity between mobile
salespeople, floor staff and behind-the-scenes finance and accounting departments.
(c) Tablet: A Tablet computer, or simply tablet is a one piece general-purpose computer
contained in a single panel. Its distinguishing characteristic is the use of a touch screen as
the input device. Tablet PCs have extreme portability, easy to use interfaces and the wide
range of ways they can be used. Some features of Tablets are as follows:
Input Method: Tablets rely solely on a touch interface on the screen for all input.
Size: Tablets have the size roughly of a small pad of paper and a weight that is less
than one Kg.
Battery Life: Tablets are designed for efficiency because of the low power
requirements of their hardware components. Tablets can achieve all day usage.
Storage Capacity: Most tablets come with configurations that allow between 16 and
64 gigabytes of storage.
Performance: Most tablet PCs are based on extremely low powered processors more
suited for tasks like email, web browsing, playing video or audio.
Software: The two major tablet platforms are Android and iOS amongst plenty of
applications that are available.
Wireless: Because tablets by design are mobile computers; most of them have Wi-
Fi, blue tooth and mobile connectivity.
(d) SmartPhone: A SmartPhone is a mobile phone built on a mobile operating system with
more advanced computing capability connectivity than a feature phone. This handheld
device integrates mobile phone capabilities with the more common features of a handheld
computer or PDA. Smartphone allows users to store information, e-mail and install
programs, along with using a mobile phone in one device. Modern SmartPhones also
include high-resolution touch screens and web browsers that display standard web pages
as well as mobile-optimized sites. High-speed data access is provided by Wi-Fi and mobile
broadband.
(e) Touchpad: A Touchpad is a pointing device featuring a tactile sensor, a specialized
surface that can translate the motion and position of a user's fingers to a relative position
on screen. Touchpad is a common feature of laptop computers, can also be found on
Personal Digital Assistants (PDAs) and some portable media players.
(f) Notebook: Notebook is an extremely lightweight personal computer that typically weighs
less than 3 Kg and is small enough to fit easily in a briefcase. Notebook computers use
access to a wide range of useful libraries and tools that can be used to build rich
applications.
(m) WhatsApp Messenger: It is a cross-platform mobile messaging application which allows
us to exchange messages without having to pay for SMS. It is available for iPhone,
BlackBerry, Android, Windows phone, Nokia and these phones can message each other.
Because WhatsApp Messenger uses the same internet data plan that we use for e -mail
and web browsing, there is no cost to message and stay in touch with friends.
Question 3
What are the three critical pillars of Business Process Automation (BPA)?
Answer
Business Process Automation rests on the following three critical pillars:
Integration: BPA allows applications and operating systems not only to read data that the
systems produce, but also to pass data between the component applications of the
business process and to modify the data as necessary.
Orchestration: The process of orchestration enables the ability to bring tasks that exist
across multiple computers and different business departments or branches under one
umbrella that is the business process itself.
Automation: Orchestration and integration unite with automation to deliver the c apability
to provide a rule-based process of automatic execution that can span multiple systems and
enable a more effective, nimble and efficient business process.
Question 4
Discuss some of the benefits of using Business Process Automation.
Answer
Some benefits of using Business Process Automation include:
Reducing the Impact of Human Error: BPA removes human participation in the process,
which is the source of many errors.
Transforming Data into Information: BPA can, apart from collecting and storing data
also analyze data and make it available in a form that is useful for decision -making.
Improving performance and process effectiveness: In many cases, tasks that must be
done manually are the bottleneck in the process. Automating those manual tasks speeds
up the effective throughput of the application.
Making users more efficient and effective: People can focus their energies on the tasks
they do best, allowing the computers to handle those that machines are best suited for.
Making the business more responsive: Business can easily automate new applications
and processes as they are introduced.
are offered on pay-per-use basis. It is widely used in the development, deployment and
management of enterprise applications, at affordable costs; and allows organizations to
deliver highly scalable and reliable applications rapidly and at more affordable costs.
Private/Internal Clouds: This cloud computing environment resides within the boundaries
of an organization and is used exclusively for the organization’s benefits. They are built
primarily by IT departments within enterprises who seek to optimize utilization of
infrastructure resources within the enterprise by provisioning the infrastructure with
applications using the concepts of grid and virtualization. The Private Cloud enables an
enterprise to manage the infrastructure and have more control.
Community Clouds: This is the sharing of computing infrastructure in between
organizations of the same community. For example, all Government organizations within
India may share computing infrastructure on the cloud to manage data. The risk is that
data may be stored with the data of competitors.
Hybrid Clouds: It is a composition of two or more clouds (Private, Community or Public)
and is maintained by both internal and external providers. Though they maintain their
unique identity, they are bound together by standardized data and application portability.
With a hybrid cloud, organizations might run non-core applications in a public cloud, while
maintaining core applications and sensitive data in-house in a private cloud.
Question 7
Discuss Cloud Computing architecture.
Answer
Cloud Computing architecture refers to the components and subcomponents that typically
consist of a front end platform (fat client, thin client, mobile device), back end platform (servers,
storage), a cloud based delivery, and a network (Internet, Intranet, Intercloud). Cloud
architecture typically involves multiple cloud components communicating with each other over
a tight or loose coupling of cloud resources, services, middleware, and software components.
A cloud computing architecture consists of two parts - Front End and a Back End that connect
to each other through a network, usually the Internet. The front end is the side the computer
user or client, sees. The back end is the “cloud” section of the system.
Front End: The front end of the cloud computing system comprises of the client’s devices
(or it may be a computer network) and some applications are needed for accessing the
cloud computing system. All the cloud computing systems do not give the same interface
to users. For example - Web services like electronic mail programs use some existing web
browsers such as Firefox, Microsoft’s Internet Explorer or Apple’s Safari. Other types of
systems have some unique applications which provide network access to its clients.
Back End: Back end refers to some physical peripherals. In cloud computing, the back
end is cloud itself which may encompass various computer machines, data storage
systems and servers. Groups of these clouds make a whole cloud computing system.
Theoretically, a cloud computing system can include practically any type of web application
program such as video games to applications for data processing, software development
and entertainment residing on its individual dedicated server for services. There are some
set of rules, generally called as Protocols which are followed by this server and it uses a
special type of software termed as Middleware that allow computers that are connected
on networks to communicate with each other. If any cloud computing service provider has
many customers, then there’s likely to be very high demand for huge storage space. Many
companies that are service providers need hundreds of storage devices.
Question 8
Discuss Service models of Cloud Computing.
Answer
Service Models of Cloud Computing are as follows:
Infrastructure as a Service (IaaS): It is the foundation of cloud services that provides
clients with access to server hardware, storage, bandwidth and other fundamental
computing resources. The service is typically paid for on a usage basis and may also
include dynamic scaling so that if the customer needs more resources than expected, s/he
can get them on the fly (probably to a given limit). It provides access to shared resources
on need basis, without revealing details like location and hardware to clients.
Software as a Service (SaaS): It includes a complete software offering on the cloud. Users
can access a software application hosted by the cloud vendor on pay-per-use basis. SaaS
is a model of software deployment where an application is hosted as a service provided to
customers across the Internet by removing the need to install and run an application on a
user’s own computer. SaaS can alleviate the burden of software maintenance and support
but users relinquish control over software versions and requirements.
Platform as a Service (PaaS): It provides clients with access to the basic operating
software and optional services to develop and use software applications (e.g. databas e
access and payment service) without the need to buy and manage the underlying
computing infrastructure. For example, Google App Engine allows clients to run their web
applications (i.e. software that can be accessed using a web browser such as Internet
Explorer over the internet) on Google’s infrastructure.
Network as a Service (NaaS): It is a category of cloud services where the capability
provided to the cloud service user is to use network/transport connecting services. NaaS
involves optimization of resource allocation by considering network and computing
resources as a whole. Some of the examples are: Virtual Private Network, Mobile Network
Virtualization etc.
Communication as a Service (CaaS): CaaS is an outsourced enterprise communication
solution that can be leased from a single vender. The CaaS vendor is responsible for all
hardware and software management and offers guaranteed Quality of Service (QoS). It
Owners of equipment-
Equip 1 Equip 2 Equip 3 Equip 4 Equip 5 Equip 6 Equip 7 Equip 8
repair invoice set
C. Relational Database Model: A relational database allows the definition of data and their
structures, storage and retrieval operations and integrity constraints that can be organized
in a table structure. A table is a collection of records and each record in a table contains
the same fields. Three key terms are used extensively in relational database models:
Relations, Attributes and Domains. A relation is a table with columns and rows. The
named columns of the relation are called attributes, and the domain is the set of values
the attributes can take.
A relational database contains multiple tables, with at least similar value occurring in two
different records (belonging to the same table or to different tables) that implies a
relationship among those two records. Tables can also have a designated single attribute
or a set of attributes that can act as a "key" which can be used to uniquely identify each
record in the table. A key that can be used to uniquely identify a row in a table is called a
Primary key. Any column can be a key, or multiple columns can be grouped together into
a Compound key.
D. Object Oriented Data Base Model (OODBMS): It is based on the concept that the world
can be modeled in terms of objects and their interactions. An Object -oriented database
provides a mechanism to store complex data such as images, audio and video, etc. An
OODBMS helps programmers make objects created in a programming language behave
as a database object. Object-oriented programming is based on a series of working
objects. Each object is an independently functioning application or program, assigned with
a specific task or role to perform. An OODBMS is a relational database designed to manage
these independent programs, using the data produced to quickly respond to requests for
information by a larger application.
Question 11
What is an Operating System? Discuss various activities it performs.
Answer
An Operating System (OS) is a set of computer programs that manages computer hardware
resources and acts as an interface with computer applications programs. The operating system
is a vital component of the system software in a computer system. Application programs usually
require an operating system to function that provides a convenient environment to users for
executing their programs. Computer hardware with operating system can thus be viewed as an
extended machine which is more powerful and easy to use. Some prominent Operating systems
used nowadays are Windows 7, Windows 8, Linux, UNIX, etc.
A variety of activities are executed by Operating systems which include:
Performing hardware functions: Application programs to perform tasks must obtain input
from keyboards, retrieve data from disk & display output on monitors. Achieving all this is
facilitated by operating system that acts as an intermediary between the application
program and the hardware.
User Interfaces: An important function of any operating system is to provide user
interface. DOS has a Command based User Interface (UI) i.e. text commands were given
to computer to execute any command, whereas Windows has Graphic User Interface
(GUI) which uses icons & menus.
Hardware Independence: Every computer could have different specifications and
configurations of hardware. Operating system provides Application Program Interfaces
(API) which can be used by application developers to create application software , thus
obviating the need to understand the inner workings of OS and hardware. Thus, OS gives
us hardware independence.
Memory Management: Memory Management features of Operating System control how
memory is accessed and maximizes available memory & storage. Operating systems also
provides Virtual Memory by carving an area of hard disk to supplement the functional
memory capacity of RAM.
Task Management: Task Management feature of Operating system helps in allocating
resources to make optimum utilization of resources. This facilitates a user to work with
more than one application at a time i.e. multitasking and allows more than one user to use
the system i.e. timesharing.
Networking Capability: Operating systems can provide systems with features &
capabilities to help connect computer networks. Like Linux & Windows 8 give us an
excellent capability to connect to internet.
Logical Access Security: Operating systems provide logical security by establishing a
procedure for identification & authentication using a User ID and Password. It can log the
user access thereby providing security control.
File Management: The Operating System keeps a track of where each file is stored and
who can access it, based on which it provides the file retrieval.
Question 12
What is CPU? What are the three functional units of a Central Processing Unit (CPU)?
Answer
The Central Processing Unit (CPU or microprocessor) is the actual hardware that interprets and
executes the program (software) instructions and coordinates how all the other hardware
devices work together. The CPU is built on a small flake of silicon and can contain the equivalent
of several million transistors. We can think of transistors as switches which could be “ON” or
“OFF” i.e., taking a value of 1 or 0. The processor or CPU is like the brain of the computer. The
main function of CPU is to execute programs stored in memory. It consists of three functional
units:
Control Unit (CU): CU controls the flow of data and instruction to and from memory,
interprets the instruction and controls which tasks to execute and when.
Arithmetic and Logical Unit (ALU): Performs arithmetic operations such as addition,
subtraction, multiplication, and logical comparison of numbers: Equal to, Greater than,
Less than, etc.
Registers: These are high speed memory units within CPU for storing small amount of
data (mostly 32 or 64 bits). Registers could be:
Accumulators: They can keep running totals of arithmetic values.
Address Registers: They can store memory addresses which tell the CPU as to
where in the memory an instruction is located.
Storage Registers: They can temporarily store data that is being sent to or coming
from the system memory.
Miscellaneous: These are used for several functions for general purpose.
Question 13
Discuss Information System Life Cycle.
Answer
Information System Life Cycle is commonly referred as Software/System Development Life
Cycle (SDLC) which is a methodology used to describe the process of building information
systems. SDLC framework provides a sequence of activities for system designers and
developers to follow. It consists of a set of steps or phases in which each phase of the SDLC
uses the results of the previous one. Various phases for developing an Information System are
given as follows:
Phase 1: System Investigation: This phase examines that ‘What is the problem and is it worth
solving’? A feasibility study is done under the dimensions – Technical, Economical, Legal,
Operational etc.
Phase 2: System Analysis: This phase examines that ‘What must the Information System do
to solve the problem’? System analyst would be gathering details about the current system and
will involve interviewing staff; examining current business; sending out questionnaires and
observation of current procedures.
The Systems Analyst will examine data and information flows in the enterprise using data flow
diagrams; establish what the proposed system will do (not how it will do it); analyze costs and
benefits; outline system implementation options. (For example: in-house or using consultants);
consider possible hardware configurations; and make recommendations.
Phase 3: System Designing: This phase examines that ‘How will the Information System do
what it must do to obtain the solution to the problem’? This phase specifies the technical aspects
of a proposed system in terms of Hardware platform; Software; Outputs; Inputs; User interface;
Modular design; Test plan; Conversion plan and Documentation.
Phase 4: System Implementation: This phase examines that ‘How will the solution be put into
effect’? This phase involves coding and testing of the system; acquisition of hardware and
software; and either installation of the new system or conversion of the old system to the new
one.
Phase 5: System Maintenance and Review: This phase evaluates results of solution and
modifies the system to meet the changing needs. Post implementation review would be done to
address Programming amendments; Adjustment of clerical procedures; Modification of Reports,
and Request for new programs.
Question 14
Differentiate between the following:
(a) Random Access Memory and Read Only Memory
(b) Hierarchical Database Model and Network Database Model
(c) Complex Instruction Set Computer (CISC) and Reduced Instruction Set Computer (RISC)
Answer
(a) The differences between Random Access Memory (RAM) and Read Only Memory (ROM)
are given below:
Random Access Memory (RAM) Read Only Memory (ROM)
RAM is a volatile memory and when the Unlike RAM, ROM is non-volatile. The
computer is turned off, RAM loses its contents of ROM remain even after the
data. When the computer is turned on computer is switched off.
again, operating system and other files
are once again loaded into RAM usually
from the hard disk.
This is Read Write memory wherein Originally, the ROM used to be read-only;
information can be read as well as however, the new versions of ROM allow
modified. limited rewriting making it possible to
upgrade firmware such as the BIOS by
using installation software.
(b) The differences between Hierarchical Database Model and Network Database Model are
given below:
Hierarchical Database Model Network Database Model
The hierarchical model permits a record Unlike the hierarchical mode, the network
to be a member of only one set at one model permits a record to be a member of
time. more than one set at one time.
The hierarchical data structure The network model allows us to represent
implements one-to-one and one-to-many one-to-one, one-to-many and many-to-
relationships. many relationships.
Each parent record may have one or Each parent record may have one or more
more child records, but no child record child records, and even a child record may
may have more than one parent record. have more than one parent record.
The hierarchical model does not The network model can represent
represent redundancy in data efficiently. redundancy in data more efficiently than
in the hierarchical model.
The hierarchical data structures require The network data structures can be
specific entrance points to find records in entered and traversed more flexibly.
a hierarchy.
(c) Complex Instruction Set Computer (CISC): If the Control Unit contains several micro-
electronic circuitries to generate a set of control signals and each micro-circuitry is
activated by a micro-code, this design approach is called CISC design. Examples of CISC
processors are: Intel 386, 486, Pentium, Pentium Pro, Pentium II, Pentium III processors
etc. CISC chips have a large, variable length and complex instructions and generally make
use of complex addressing modes. Different machine programs can be executed on CISC
machine. Since CISC processors possess so many processing features, the job of machine
language programmers becomes easier. But at the same time, they are complex as well
as expensive to produce. Now-a-days, most of the personal computers use CISC
processors.
Reduced Instruction Set Computer (RISC): To execute each instruction, if there is
separate electronic circuitry in the control unit, which produces all the necessary signals,
this approach of the design of the control section of the processor is called RISC design.
It is also called hard-wired approach. Examples of RISC processors: IBM RS6000,
MC88100 processors etc. RISC processors use a small and limited number of instructions
and mostly use hardwired control unit. These consume less power and are having high
performance. RISC processors use simple addressing modes and RISC instruction is of
uniform fixed length. Since RISC processors have a small instruction set, they place extra
demand on programmers who must consider how to implement complex computations by
combining simple instructions. However, RISC processors are faster, less complex and
less expensive than CISC processors because of their simpler design.
Question 15
What is mobile computing? What are the three major concerns related to mobile computing?
Answer
Mobile Computing: Mobile Computing is the use of portable computing devices (such as laptop
and handheld computers) in conjunction with mobile communication technologies to enable
users to access the Internet and data on their home or work computers from anywhere in the
world. Mobile computing is enabled by use of mobile devices (portable and hand held computing
devices) such as PDA, laptops, mobile phones, MP3 players, digital cameras, tablet PC and
Palmtops on a wireless network.
Major concerns relating to mobile computing are given as follows:
Mobile computing has its fair share of security concerns as any other technology.
Dangers of misrepresentation - Another problem plaguing mobile computing are credential
verification.
Power consumption - When a power outlet or portable generator is not available, mobile
computers must rely entirely on battery power.
Potential health hazards
Question 16
Name the various phases of System Development Life Cycle (SDLC) in the logically correct
order.
Answer
The various phases of System Development Life Cycle (SDLC) are as follows:
Phase 1: System Investigation
Phase 2: System Analysis
Phase 3: System Designing
Phase 4: System Implementation
Phase 5: System Maintenance and Review
Question 17
What is Server? Briefly explain any four types of servers based on the nature of service they
provide.
Answer
Server: A server is a computer program running to serve the requests of other programs, the
"clients". Servers are often dedicated, meaning that they perform no other tasks besides
their server tasks. The clients either run on the same computer, or they connect through
the network. Some of the different types of servers based on the nature of service they
provide are as follows:
File server: This is a computer and storage device dedicated to storing files. Any user on
the network can store files on the server.
Print server: This is a computer that manages one or more printers.
Network server: This is a computer that manages network traffic.
Database server: This is a computer system that processes database queries.
Application Server: This is a program that handles all application operations between
users and an enterprise's backend business applications or databases.
Web Server: Web server has an IP address and possibly a domain name, and is the
computer that delivers (serves up) web pages.
Mail Server: Mail servers move and store mail over corporate networks.
Question 18
(a) Mention briefly the different types of application software.
(b) What are the major advantages and disadvantages of DBMS?
Answer
(a) The different types of application software are as under:
Application Suite: Has multiple applications bundled together. Related functions,
features and user interfaces interact with each other. E.g. MS Office 2010 which has
MS Word, MS Excel, MS Access, etc.
Enterprise Software: Addresses an enterprise’s needs and data flow in a huge
distributed environment. E.g. ERP Applications like SAP.
Enterprise Infrastructure Software: Provides capabilities required to support
enterprise software systems. E.g. email servers, Security software.
Information Worker Software: Addresses individual needs required to manage and
create information for individual projects within departments. E.g. Spreadsheets,
CAAT (Computer Assisted Audit Tools) etc.
Content Access Software: Used to access contents and addresses a desire for
published digital content and entertainment. E.g. Media Players, Adobe Digital etc.
Educational Software: Holds contents adopted for use by students. E.g.
Examination Test CDs.
Media Development Software: Addresses individual needs to generate and print
electronic media for others to consume. E.g. Desktop Publishing, Video Editing etc.
(b) Major advantages of Database Management Systems (DBMS) are given as follows:
Permitting data sharing: One of the principle advantages of a DBMS is that the
same information can be made available to different users.
Minimizing Data Redundancy: In a DBMS duplication of information or redundancy
is, if not eliminated, carefully controlled or reduced i.e. there is no need to repeat the
same data repeatedly. Minimizing redundancy can therefore significantly reduce the
cost of storing information on hard drives and other storage devices.
Integrity can be maintained: Data integrity is maintained by having accurate,
consistent, and up-to-date data. Updates and changes to the data only must be made
in one place in DBMS ensuring Integrity. The chances of making a mistake increase
if the same data needs to be changed at several different places than making the
change in one place.
Program and file consistency: Using a DBMS, file formats and programs are
standardized. This makes the data files easier to maintain because the same rules
and guidelines apply across all types of data. The level of consistency across files
and programs also makes it easier to manage data when multiple programmers are
involved.
User-friendly: DBMS makes the data access and manipulation easier for the user.
DBMS also reduce the reliance of users on computer experts to meet their data
needs.
Improved security: DBMSs allow multiple users to access the same data resources
which could lead to risk to an enterprise if not controlled. Security constraints can be
defined i.e. Rules can be built to give access to sensitive data. Some sources of
information should be protected or secured and only viewed by select individuals.
Using passwords, database management systems can be used to restrict data access
to only those who should see it.
Achieving program/data independence: In a DBMS data does not reside in
applications but data bases program & data are independent of each other.
Faster application development: In the case of deployment of DBMS, application
development becomes fast. The data is already therein databases, application
developer has to think of only the logic required to retrieve the data in the way a user
needs.
Major disadvantages of DBMS are as under:
Cost: Implementing a DBMS system can be expensive and time-consuming,
especially in large enterprises. Training requirements alone can be quite costly.
Security: Even with safeguards in place, it may be possible for some unauthorized
users to access the database. If one gets access to database, then it could be an all
or nothing proposition.
Question 19
Describe the following Recent technologies in the field of IT:
(i) iPad
(ii) Ultra Mobile PC (UMPC)
(iii) I-pod
Answer
(i) iPad: The iPad runs a version of iOS. iOS is designed for finger based use and has
none of the tiny features which required a stylus on earlier tablets. Apple introduced
responsive multi touch gestures, like moving two fingers apart to zoom in. iOS uses
less power, and so gives better battery life than the Intel devices used by Windows
tablets.
(ii) Ultra Mobile PC (UMPC): An Ultra-Mobile PC is a small form factor version of a pen
computer, a class of laptop whose specifications were launched by Microsoft and Intel
in spring 2006. UMPCs are smaller than subnotebooks, have a TFT display measuring
(diagonally) about 12.7 to 17.8 cm (5 to 7 inch screen), are operated like tablet PCs
using a touch screen or a stylus, and can also have a physical keyboard.
(iii) iPod: The iPod is a line of portable media players designed and marketed by
Apple Inc. There are four current versions of the iPod: the ultra-compact iPod
Shuffle, the compact iPod Nano, the touch screen iPod Touch, and the hard drive-
based iPod Classic. Like other digital music players, iPods can serve as external
data storage devices. Storage capacity varies by model, ranging from 2 GB for
the iPod Shuffle to 160 GB for the iPod Classic.
Question 20
Write some Information Systems Control procedures covering the access safeguards
over computer programs.
Answer
(a) Information Systems Control procedures covering the access safeguards over
computer programs are as follows:
Strategy and direction;
General Organization and Management;
Access to IT resources, including data and programs;
System development methodologies and change control;
Operation procedures;
System Programming and technical support functions;
Quality Assurance Procedures;
Physical Access Controls;
Business Continuity Planning(BCP) and Disaster Recovery Planning (DRP);
Network and Communication;
Database Administration; and
Protective and detective mechanisms against internal and external attacks.
Exercise
6. What are the major activities involved in the Conversion phase of System Implementation in SDLC?
7. Give some examples of business applications of Mobile computing?
8. Discuss different types of Application Software.
9. What are the advantages and disadvantages of the following:
(a) Application Software (b) DBMS